0% found this document useful (0 votes)
131 views8 pages

It Data Audit Gap Analysis

This document describes a data audit gap analysis tool that identifies gaps in an organization's data architecture. It contains instructions for using the tool to complete assessments in various data dimensions and identify scores. The results tab then analyzes the scores to determine priority areas for improvement, such as data quality which requires enhancing dedicated resources, standards, and reducing duplicate or stale data. It also offers recommendations like strengthening mobile data security and policies regarding access, authorization, and quality. The overall goal is to evaluate data management practices and inform plans for architectural and process modifications.

Uploaded by

sanketd1983
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views8 pages

It Data Audit Gap Analysis

This document describes a data audit gap analysis tool that identifies gaps in an organization's data architecture. It contains instructions for using the tool to complete assessments in various data dimensions and identify scores. The results tab then analyzes the scores to determine priority areas for improvement, such as data quality which requires enhancing dedicated resources, standards, and reducing duplicate or stale data. It also offers recommendations like strengthening mobile data security and policies regarding access, authorization, and quality. The overall goal is to evaluate data management practices and inform plans for architectural and process modifications.

Uploaded by

sanketd1983
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Data Audit Gap Analysis

Purpose
This tool is designed to identify the gaps in your organization's Data Architecture, as a result of a data audit. This gap analysis also offers a series of
recommendations based on the answers provided, and will help you identify the areas in which your data architecture and management practices
can be modified for improvement.
Instructions
Complete the Data Audit Gap Analysis by answering all of the questions in the 2. Audit Dimension and 3. Self Assessment tabs by choosing the
most appropriate response from the drop-down options, located in the white boxes.
The summation of your score will be shown on the 4. Gap Analysis tab. Info-Tech will provide insight to the right of each category, based on the
state of your assessment, as well as an indication of what you need to focus on to improve your results.
Use the results provided to as an input to your data architecture plan. Contact your Info-Tech Research Group account manager if an Info-Tech
Assist call to help you complete the tool and/or assess the results of the tool is required.
Disclaimer
Spreadsheet functionality is based on the Info-Tech Solution Set released in Q1 2013.
This tool is optimized for use with Microsoft Excel 2003.
Please note: the recommendations provided are based on generalities and averages and the results of this tool should be considered within the
context of your organization. They are recommendations only and should be taken as such.
Info-Tech Research Group tool and template documents are provided for the free and unrestricted use of subscribers to Info-Tech Research Group
services. These documents are intended to supply general information only, not specific professional or personal advice, and are not intended to be
used as a substitute for any kind of professional advice. Use this document either in whole or in part as a basis and guide for document creation. To
customize this document with corporate marks and titles, simply replace the Info-Tech information in the header and footer fields of this document.
Data Audit Gap Analysis
Purpose
This tool is designed to identify the gaps in your organization's Data Architecture, as a result of a data audit. This gap analysis also offers a series of
recommendations based on the answers provided, and will help you identify the areas in which your data architecture and management practices
can be modified for improvement.
Instructions
Complete the Data Audit Gap Analysis by answering all of the questions in the 2. Audit Dimension and 3. Self Assessment tabs by choosing the
most appropriate response from the drop-down options, located in the white boxes.
The summation of your score will be shown on the 4. Gap Analysis tab. Info-Tech will provide insight to the right of each category, based on the
state of your assessment, as well as an indication of what you need to focus on to improve your results.
Use the results provided to as an input to your data architecture plan. Contact your Info-Tech Research Group account manager if an Info-Tech
Assist call to help you complete the tool and/or assess the results of the tool is required.
Disclaimer
Spreadsheet functionality is based on the Info-Tech Solution Set released in Q1 2013.
This tool is optimized for use with Microsoft Excel 2003.
Please note: the recommendations provided are based on generalities and averages and the results of this tool should be considered within the
context of your organization. They are recommendations only and should be taken as such.
Info-Tech Research Group tool and template documents are provided for the free and unrestricted use of subscribers to Info-Tech Research Group
services. These documents are intended to supply general information only, not specific professional or personal advice, and are not intended to be
used as a substitute for any kind of professional advice. Use this document either in whole or in part as a basis and guide for document creation. To
customize this document with corporate marks and titles, simply replace the Info-Tech information in the header and footer fields of this document.
Data Quality
Security
Compliance
Data Ownership
Process and Policies
Data Audit Current State Assessment Questionnaire
Please indicate the level of importance for each of these subject areas, with respect to your organization, industry and geography.
Use the drop-down list to select your answer based on the scale below:
1 = Not Important- 2 - 3 - 4 - 5 = Very Important
5
5
4
4
4
Data Audit Current State Assessment Questionnaire
Please indicate the level of importance for each of these subject areas, with respect to your organization, industry and geography.
Use the drop-down list to select your answer based on the scale below:
1 = Not Important- 2 - 3 - 4 - 5 = Very Important
We have dedicated data entry resources
We have data entry standards
We have a low level of data duplication and replication
We have standard data definitions across the organization
We have a lot of stale, inaccurate, incomplete data
We encrypt sensitive data
We have strong data access and authorization rules and mechanisms in place
We enforce strong password / user credentials
We are able to protect data on mobile devices
We are compliant with protecting PII in our data
We are compliant with strong regulations (HIPAA, SOX, PCI SSC)
We adhere to cross-border / cross-jurisdictional data regulation requirements
We have identified data owners
We have data stewards
We have dedicated data entry resources
Our data owners and stewards have authority to enforce standards and policies
We have data entry standards
We have data protection and security policies
We have data access and authorization policies
We have data quality policies
We have password rule policies
Policies are adhered to and not circumvented.
To what extent do you agree with the following statements about your organization? Use the drop-down list to select your answer based on the scale below:
1 = Strongly Disagree - 2 - 3 - 4 - 5 = Strongly Agree
Data Audit Self Assessment Questionnaire
Compliance
Data Ownership
Process and Policies
Data Quality
Security
3
3
3
3
3
4
4
4
2
3
3
3
5
5
4
4
4
4
3
3
4
4
To what extent do you agree with the following statements about your organization? Use the drop-down list to select your answer based on the scale below:
1 = Strongly Disagree - 2 - 3 - 4 - 5 = Strongly Agree
Data Audit Self Assessment Questionnaire
Compliance
Data Ownership
Process and Policies
Data Quality
Security
Priority Category
1 Data Quality
2 Security
3 Compliance
4 Process and Policies
5 Data Ownership
Your data process and policies do not require significant improvement.
Improve your score relative to: Data access and authorization policies; Data quality policies
Advice
Data Audit Gap Analysis Results
Your data quality requires improvement.
Improve your score relative to: Dedicated data entry resources; Data entry standards; Data duplication and replication; Standard data
definitions; Stale, inaccurate, or incomplete data
Your data security capabilities do not require significant improvement.
Improve your score relative to: Mobile data security
Your data compliance capabilities do not require significant improvement.
Improve your score relative to: Protection of PII; Regulation compliance; Cross-jurisdictional regulations
Your data ownership does not require significant improvement.
0
0.5
1
Data Quality
Compliance Data Ownership
Process and Policies
Gap Analysis
Your data process and policies do not require significant improvement.
Improve your score relative to: Data access and authorization policies; Data quality policies
Advice
Data Audit Gap Analysis Results
Your data quality requires improvement.
Improve your score relative to: Dedicated data entry resources; Data entry standards; Data duplication and replication; Standard data
definitions; Stale, inaccurate, or incomplete data
Your data security capabilities do not require significant improvement.
Improve your score relative to: Mobile data security
Your data compliance capabilities do not require significant improvement.
Improve your score relative to: Protection of PII; Regulation compliance; Cross-jurisdictional regulations
Your data ownership does not require significant improvement.
Security
Compliance

You might also like